期刊文献+

基于RS232协议时隙的硬件木马设计 被引量:5

Hardware Trojan Design Based on Interval Property of RS232 Protocol
下载PDF
导出
摘要 密码芯片的硬件安全模块在IC生产和制造的过程中易被植入硬件木马等恶意电路。鉴于硬件木马的强大功能,提出了基于RS232协议时隙的硬件木马设计方法。利用RS232协议的异步特性,对其发送密文字节间的时隙进行编码,从而实现密码芯片中密钥的隐蔽泄漏;并通过功能分析和电磁旁路分析两种方法成功检测出木马所发送出的密钥。实验表明,该硬件木马在占用不到40个寄存器的情况下,成功实现了DES密钥的泄漏。 Hardware security modules for crypto-processors may be threatened due to the inserting of malicious circuits in IC fabrication process, such as hardware Trojan which is of strong function. To research the issue, a hardware Trojan design based on interval property of RS232 protocol is proposed. On the basic of the asynchronous point of RS232, an attack for leakage of secret key can be implemented to encode the inter-byte timing of the en- crypted data output on the RS232 serial port. Two methods, function analysis and electromagnetic side-channel analysis, are applied to detect the running process of hardware Trojan. The experimental results show that the at- tack could implement the leakage of secret key while the hardware Trojan circuits occupy less than 40 flip-flops.
出处 《科学技术与工程》 北大核心 2013年第28期8284-8287,共4页 Science Technology and Engineering
基金 国家自然科学基金(61271152) 河北省自然科学基金(F2012506008) 院基金(YJJXM11019)资助
关键词 RS232 硬件木马 功能分析 电磁旁路分析 RS232 hardware Trojan function analysis electromagnetic side-channel analysis
  • 相关文献

参考文献8

  • 1Lin L, Burleson W, Paar C. MOLES: molicious off-chip leakage en- abled by side-channels. Proceedings of the 2009 International Confer- ence on Computer-aided Design. New York: ACM, 2009:117--122.
  • 2Abramovici M, Bradley P. Integrated circuit security-new threats and solutions. Cyber Security and Information Infrastructure ResearchWorkshop ( CSIIRW'09 ), 2009.
  • 3Koushanfar F, Mirhoseini A. A unified framework for multimodal submodular integrated circuits trojan detection. IEEE Transactions on Information Forensics and Security, 2011 ,6 ( 1 ) : 162--174.
  • 4King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware. Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008:1--8.
  • 5Banga M, Hsiao M. Novel sustained vector technique for the detection of hardware trojans. Proceedings of 22nd International Conference on VLSI design, 2009 : 327--332.
  • 6Lamech C, Rad R, Tehranipoor M, et al. An experimental analysis of power and delay signal-to-noise requirements for detecting trojans and methods for achieving the requied detection sensitivities. IEEE Transactions on Information Forensics and Security, 2011, 6 (3): 142--155.
  • 7张鹏,邹程,邓高明,陈开颜.基于电磁泄漏相关性分析的硬件木马设计[J].华中科技大学学报(自然科学版),2010,38(10):22-25. 被引量:17
  • 8刘长龙,赵毅强,史亚峰,冯紫竹.基于侧信道分析的硬件木马建模与优化[J].华中科技大学学报(自然科学版),2013,41(2):53-57. 被引量:13

二级参考文献23

  • 1Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: challenges and solutions[C]//1st IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscataway:IEEE Press, 2008: 15-19.
  • 2U S D of Defense. Defense science board task force on high performance microchip supply[DB/CD][2010-01-10]. http://www. acq. osd. mil/dsb/reports/2005-02 HPMS Report Final. pdf.
  • 3Adee S. The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34-39.
  • 4King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware [C]// Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2008: 1-8.
  • 5Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting[C]// Proceedings of IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2007: 296- 310.
  • 6Lin L, Burleson W, Paar C. MOLES: Malicious offchip leakage enabled by side-channels [C]//Proceed ings of the 2009 International Conference on Computer-aided Design. New York: ACM, 2009: 117-122.
  • 7Banga M, Hsiao M S. A region based approach for the identification of hardware trojans[C]//IEEE International Workshop on Hardware-oriented Security and Trust (HOST2008). Piscataway: IEEE Press, 2008: 40-47.
  • 8Chakraborty R, Paul S, Bhunia S. On-demand transparency for improving hardware trojan detectability [C]//IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscat-away:IEEE Press, 2008: 48-50.
  • 9Rad R M, Wang X, Tehranipoor M, et al. Power supply signal calibration techniques for improving detection resolution to hardware troians[C]// Proceedings of the 2008 IEEE/ACM International Conference on Computer-aided Design. Piscataway: IEEE Press, 2008: 632-639.
  • 10Jin Y, Makris Y. Hardware trojan detection using path delay fingerprint[C]//1st IEEE International Workshop on Hardware-oriented Security and Trust (HOST2008). Piscataway: IEEE Press, 2008: 51- 57.

共引文献26

同被引文献23

  • 1罗宏伟.集成电路芯片安全隐患检测技术[J].半导体技术,2007,32(12):1094-1097. 被引量:5
  • 2Tehranipoor M, Koushanfar F. A survey of hardware trojan taxonomy and detection [ J ]. IEEE Design & Test of Computers, 2010,27 ( l ) : 10 - 25.
  • 3Wang X, Tehranipoor M, PlusquellicJ. Dectecting malicious inclusions in secure hardware:challenges and solutions [ C ] // 1' IEEE International Workshop on Hardware-oriented Security and Trust ( HOST2008 ). Piscataway : IEEE Press ,2008 : 15 - 19.
  • 4King S T, TucekJ, Cozzie A, et al. Designing and implementing malicious hardware [ A ]. Proceeding of the 1' USENIX Workshop on Large--Scale Exploits and Emergent Threats(LEET) [ C]. 2008,1 - 8.
  • 5Jin Y, Kuoo N, Makris Y. Experiences in hardware Trojan design and implementation [ C ] /J IEEE International Workshop on Hardware-oriented Security and Trust ( HOST2009 ). Piscataway : IEEE Press, 2009 : 50 -57.
  • 6Koushanfar F, Mirhoseini A. A unified framework for multimodal submodular integrated circuits trojandetection [ J]. IEEE Transactions on Information Forensics and Security ,2011,6( 1 ) : 162 - 174.
  • 7张鹏,邹程,邓高明,陈开颜.基于电磁泄漏相关性分析的硬件木马设计[J].华中科技大学学报(自然科学版),2010,38(10):22-25. 被引量:17
  • 8牛小鹏,李清宝,王炜,张丹.硬件木马技术研究综述[J].信息工程大学学报,2012,13(6):740-748. 被引量:10
  • 9张鹏,王新成,周庆.一种基于电磁分析的硬件木马旁路检测方法[J].微电子学与计算机,2013,30(12):14-17. 被引量:2
  • 10乔宗良,张蕾,周建新,司风琪,徐治皋.一种改进的CPSO-LSSVM软测量模型及其应用[J].仪器仪表学报,2014,35(1):234-240. 被引量:21

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部